Search Results - (( developing chain efficient algorithm ) OR ( java extraction method algorithm ))
Search alternatives:
- extraction method »
- developing chain »
- method algorithm »
- chain efficient »
- java extraction »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The proposed method, XiFLEX has been implemented using two different techniques (java based & XQuery) and compared with the original FLEX algorithm in its basic implementation and the Apriori algorithm for frequent patterns generation. …”
Get full text
Get full text
Thesis -
2
Multi-base number representation in application to scalar multiplication and pairing computation
Published 2011“…Providing new methods using chains beyond the binary chain will increase the efficiency and speed of elliptic based curve cryptosystems. …”
Get full text
Get full text
Thesis -
3
Computation of cryptosystem based on Lucas functions using addition chain
Published 2010“…Lucas Functions are the special form of second-order linear recurrence relation using a large public integer as modulus. In this paper, an efficient computation algorithm for LUC Cryptosystem is developed. …”
Get full text
Get full text
Conference or Workshop Item -
4
Development of bi-objective optimization model for supply chain network design using data envelopment analysis
Published 2017“…Facility efficiency is recently focused by some scholars as a new objective in supply chain network. …”
Get full text
Get full text
Thesis -
5
Mathematical models and optimization algorithms for low-carbon Location-Inventory-Routing Problem with uncertainty
Published 2024“…Given the NP-Hard nature of the three models proposed in this thesis, two metaheuristic algorithms have been developed. A hybrid Particle Swarm Optimization-Bacterial Foraging Algorithm is developed for solving the single objective LIRP model. …”
Get full text
Get full text
Get full text
Thesis -
6
Deep reinforcement learning-based driving strategy for avoidance of chain collisions and its safety efficiency analysis in autonomous vehicles
Published 2022“…Two aspects (single-agent and multiagent) have assessed the efficiency of algorithms. Every aspect has been analyzed regarding the traffic flows: (1) the controlling efficiency of unexpected traffic situations by the sudden slowdown, (2) abrupt lane change, and (3) smoothly reaching the destination. …”
Get full text
Get full text
Get full text
Article -
7
Deep reinforcement learning based driving strategy for avoidance of chain collisions and its safety efficiency analysis in autonomous vehicles
Published 2022“…Two aspects (single-agent and multi-agent) have assessed the efficiency of algorithms. Every aspect has been analyzed regarding the traffic flows: (1) the controlling efficiency of unexpected traffic situations by the sudden slowdown, (2) abrupt lane change, and (3) smoothly reaching the destination. …”
Get full text
Get full text
Get full text
Article -
8
Detection of head position using chain code algorithm
Published 2007“…Features from the image are train using the Chain Code Algorithm (CCA) to do recognition of the crux human head then do detecting process. …”
Get full text
Get full text
Thesis -
9
Detection of head position using chain code algorithm
Published 2007“…Features from the image are train using the Chain Code Algorithm (CCA) to do recognition of the crux human head then do detecting process. …”
Get full text
Get full text
Thesis -
10
Optimization of supply chain management by simulation based RFID with XBEE Network
Published 2015“…In order to solve this problem, a simulation based “Multi-Colony Global Particle Swarm Optimization (MC-GPSO)” algorithm was developed. This algorithm computes the optimal results of objective functions in a scientific manner. …”
Get full text
Get full text
Get full text
Thesis -
11
An optimization approach for a joint location inventory model considering quantity discount policy
Published 2013“…An efficient two-stage heuristic algorithm is developed to solve the model. …”
Get full text
Get full text
Article -
12
An enhanced soft set data reduction using decision partition order technique
Published 2017“…The second contribution is enhancing the probability of search domain of Markov chain model. Furthermore, this research proposes an efficient Soft-Set Reduction accuracy based on Binary Particle Swarm optimized by Biogeography-Based Optimizer (SSR-BPSO-BBO) algorithm that can generate accurate decision for optimal and sub-optimal results. …”
Get full text
Get full text
Thesis -
13
Image clustering comparison of two color segmentation techniques
Published 2010“…There are many algorithm for analysing clustering each having its own method to do clustering. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Enhancing efficiency of automobile assembly line using the Fuzzy logical and Multi-objective Genetic Algorithm
Published 2012“…The new technique in this study is use to develop the efficiency of the assembly line and to solve the unbalancing problem among stations. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Optimizing capacitated electric vehicle route in logistic operations
Published 2024“…This project aims to develop an efficient route optimization algorithm for Capacitated Electric Vehicles (CEVs) in logistics, focusing on minimizing travel distance while adhering to vehicle capacity and battery limitations. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Solving the integrated inventory supply chain problems using meta-heuristic methods / Seyed Mohsen Mousavi
Published 2018“…In order to solve the model, a multi-objective particle swarm optimization (MOPSO) approach was applied. The efficiency of the algorithm was compared to a multi-objective genetic algorithm (MOGA) as well. …”
Get full text
Get full text
Get full text
Thesis -
17
Mapreduce algorithm for weather dataset
Published 2017“…This original dataset is stored in Hadoop Distributed File System. Next, MapReduce Algorithm is developed using Java programming. The algorithm is tested using small and big dataset. …”
Get full text
Get full text
Thesis -
18
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. …”
Get full text
Get full text
Get full text
Article -
19
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
20
Development of closed–loop supply chain network in terms of corporate social responsibility
Published 2017“…Due to the rise in awareness of environmental issues and the depletion of virgin resources, many firms have attempted to increase the sustainability of their activities. One efficient way to elevate sustainability is the consideration of corporate social responsibility (CSR) by designing a closed loop supply chain (CLSC). …”
Get full text
Get full text
Get full text
Article
